#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Why You Should Enroll In Cyber Security Awareness Training

Why You Should Enroll In Cyber Security Awareness Training

Apr 14, 2015
When it comes to cyber security, even big organizations lack the basic knowledge of how to protect company's data from the outside. Everyday businesses are facing the threat of phishing, ransomware , data breaches and malware attacks that not only results in millions of dollars losses, but also damaged the reputations. A new study shows that five out of six of the most serious IT security threats directly relate to phishing or the aftermath of a successful phishing attack . SEA, short for Syrian Electronic Army , is famous for its advanced phishing attack capabilities and with the help of the same technique they fooled many popular organizations, social media and news media, including Twitter, Microsoft, Skype, Forbes, eBay and Paypal. Where do we lack? According to the annual Verizon Data Breach Investigations report, about 58% of cyber security incidents were caused by employees, either due to failure in handling data or approving malicious data. So, in...
Chinese Hackers Target Air-Gapped Networks in Southeast Asia

Chinese Hackers Target Air-Gapped Networks in Southeast Asia

Apr 13, 2015
A State-sponsored Cyber Espionage Group -- most likely linked to the Chinese government becomes the first group to target the so-called " Air-Gapped Networks " that aren't directly connected to the Internet. What are Air-Gapped systems? Air-gapped systems are known to be the most safest and secure systems on the earth. These systems are isolated from the Internet or any other Internet-connected computers or external networks. Air-gapped systems are generally used in the critical situations that demand high security like in payment networks to process debit and credit card transactions, military networks, and in industrial control systems that operate critical infrastructure of the Nation. Why Air-Gapped? It is very difficult to siphon data from Air-Gapped systems because it requires a physical access to the target system or machine in order to do that and gaining physical access is possible only by using removable devices such as a firewire cab...
Hacker Leaks Kelly Brook's Photos Once Again

Hacker Leaks Kelly Brook's Photos Once Again

Apr 13, 2015
After the last year's scary celebrities photo leaks incident 'The Fappening' and ' The Spanning ', we thought that the celebs private pictures and contents are finally safe due to tight security provided by various cloud service provider and online awareness. But … Kelly Brook has reportedly fallen victim to the another photo scandal. Yes, you heard right. The famous ' One Big Happy ' star has once again become the victim of a hacker and 34 more pictures of 35-year-old model leaked online last week, according to The Sun. This is the second time when Kelly Brook's private photos have been hacked and leaked on the Internet. Last year, Brook was among the group of those celebrities who had their private pictures accessed by hackers. The huge photo leak hack affected many high profile stars including Jennifer Lawrence , Kim Kardashian , Rihanna and Selena Gomez . Previously leaked photos of Kelly on the Internet was pictured posing in a bikini and goin...
cyber security

The MCP Security Guide for Early Adopters

websiteWizArticles Intelligence / MCP Security
Thousands of MCP servers are already live, but most security teams don't have a clear strategy yet. Get the practical guide to MCP for security teams.
cyber security

How Security Leaders, like Snowflake's CISO, are Securing Unmanaged Devices

websiteBeyond IdentityIdentity Security / Enterprise Protection
Unmanaged devices fuel breaches. Learn 5 ways CISOs secure them without hurting productivity.
Hacker Who Stole Money From Bill Gates Arrested in Philippines

Hacker Who Stole Money From Bill Gates Arrested in Philippines

Apr 13, 2015
What if you get into the bank account of the World's most richest person? Maybe it could be difficult for you as well as I. But not for this guy… ... Konstantin Simeonov Kavrakov , a Bulgarian hacker, who hacked into the ATM and stole thousands of dollars from the bank account of Microsoft mogul Bill Gates with fake ATM cards arrested in Philippines, according to the Philippine National Police. The 31-year-old man was arrested red-handed by the Philippine National Police while he was withdrawing cash from an ATM using fake cards. He had stolen tens of thousands of dollars from many victims by hacking into the automated teller machines (ATMs). In 2011, Kavrakov got arrested and was jailed in Paraguay for hacking into the Bill Gates' account in The Philippines' densely-populated Quezon City and stealing thousands of dollars. Since then Kavrakov was on the hit list of many countries police. During the arrest, the police recovered seven cloned credit card...
'Net neutrality' — Save The Internet Before It's Too Late

'Net neutrality' — Save The Internet Before It's Too Late

Apr 13, 2015
Perhaps you have heard about "Net Neutrality," and the recent controversies over it in India. But first let's understand What does Net Neutrality mean? Net Neutrality is simply the Internet Freedom — Free, Fast and Open Internet for all. Net Neutrality is the principle that Internet service providers (ISPs) should give consumers access to all and every contents and application on an equal basis, treating all Internet traffic equally. Today, if there's something that makes everyone across the world "Equal" is nothing but the Internet. Equality over the Internet means, the richest man in the world has the same rights to access the Internet as the poorer. And this is what "Net Neutrality" aims at. But, What if someone snatches this Internet Freedom from you all? What if you have to pay extra for every single app you want? What if you have to pay extra for loading website of your choice faster? This is exactly what the Tel...
China Using A Powerful 'Great Cannon' Weapon to Censor The Internet

China Using A Powerful 'Great Cannon' Weapon to Censor The Internet

Apr 11, 2015
China has something very impressive that we are not aware of. The country has a powerful and previously unknown weapon that its government is using to bolster their cyber attack capabilities: Dubbed " The Great Cannon. " INTERNET CENSORSHIP IN CHINA When I talk about Internet censorship, it is incomplete if I don't mention China. China is famous for its Great Wall of China and Great Firewall of China . The censoring of Internet access and blocking an individual website in China by its government, known as the Great Firewall of China. But, why the Chinese government does that? The answer is very simple: The Chinese government restricts those contents it deems sensitive for its country's so-called democracy. It illegalize certain online speech and activities, block selected websites, and filter keywords out of searches initiated from computers located in Mainland China. The worse: Those Chinese citizens who offend authorities against Int...
Expert Insights Articles Videos
Cybersecurity Resources
//]]>